Expert analysis
Securing the foundation of IT systems
Recent studies show that securing the operating system is recognized as a necessary practice in an organization’s overall security policy, but it is not being done on a …
Q&A: Digital signatures and use cases for Adobe CDS
Steve Duncan is the Director of Entrust Certificate Services. Entrust Certificates for Adobe CDS enable organizations to use digital signatures to sign Adobe PDF files with …
Looking back at spam in 2009
At the end of last year, it was predicted spam volumes would rise slightly higher than 95 percent in 2009 because of a growing use of botnets. Let’s see if the …
Safety in the cloud
It’s a common scenario right now, played out in executive suites across the country. A company is looking to cut back on expenses and overhead. IT, with its myriad of …
Q&A: Web application scanning
Mike Shema is the Web Application Security Engineer at Qualys. In this interview, he discusses the challenges related to effective Web application scanning, the way a Web …
Changes coming to the OWASP Top 10 in 2010
In the spirit of improving Web application security worldwide the folks at OWASP have released the OWASP Top 10 2010 “release candidate”. It’s currently open …
Privacy in the spotlight: 8 million reasons
There is an all-around media frenzy going on about the 8 million GPS location requests that Sprint Nextel received and automatically granted through a web portal to law …
Microsoft’s security patches year in review: A malware researcher’s perspective
It’s no secret that Microsoft has had the lion’s share of security vulnerabilities. Its success as a company has made it the most obvious and profitable target for …
Staying ahead of the cybercriminal
There has been a lot of talk this year about the increasing sophistication of cybercrime threat – even going so far as to claim that virus creation has moved into the …
5 handy WordPress security plug-ins, part 2
If you’re one among the millions of users of WordPress, and you really don’t have that much knowledge about what’s going on under the hood, your best bet to …
Invasive vs. non invasive web application security scan
When evaluating an automated web application security tool, such as Acunetix WVS, the first two questions that typically one would ask are “Does this tool perform an …
Top 5 Firefox add-ons: Security testing and assessment
Test your sites and web applications and perform a security assessment/audit of your work with these handy tools: 1. Tamper Data Use it to view and modify HTTP/HTTPS headers …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd